UNIX and Linux System Administration Handbook by Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley & Dan Mackin
Author:Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley & Dan Mackin [Nemeth, Evi]
Language: eng
Format: azw3, epub, pdf
Tags: Linux, UNIX, System Administration
Publisher: Pearson Education
Published: 2017-09-15T04:00:00+00:00
Table 17.2: PAM control flags
If PAM could simply return a failure code as soon as the first individual module in a stack failed, the control-flags system would be simpler. Unfortunately, the system is designed so that most modules get a chance to run regardless of their sibling modules’ success or failure, and this fact causes some subtleties in the flow of control. (The intent is to prevent an attacker from learning which module in the PAM stack caused the failure.)
required modules are required to succeed; a failure of any one of them guarantees that the stack as a whole will eventually fail. However, the failure of a module that is marked required doesn’t immediately stop execution of the stack. If you want that behavior, use the requisite control flag instead of required.
The success of a sufficient module aborts the stack immediately. However, the ultimate result of the stack isn’t guaranteed to be a success because sufficient modules can’t override the failure of earlier required modules. If an earlier required module has already failed, a successful sufficient module aborts the stack and returns failure as the overall result.
Before you modify your systems’ security settings, make sure you understand the system thoroughly and that you double-check the particulars. (You won’t configure PAM every day. How long will you remember which version is requisite and which is required?)
Download
UNIX and Linux System Administration Handbook by Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley & Dan Mackin.epub
UNIX and Linux System Administration Handbook by Evi Nemeth & Garth Snyder & Trent R. Hein & Ben Whaley & Dan Mackin.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7770)
Filmora Efficient Editing by Alexander Zacharias(5823)
The Infinite Retina by Robert Scoble Irena Cronin(5302)
Learn Wireshark - Fundamentals of Wireshark. by Lisa Bock(3997)
Linux Device Driver Development Cookbook by Rodolfo Giometti(3937)
Edit Like a Pro with iMovie by Regit(3446)
Linux Administration Best Practices by Scott Alan Miller(2862)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic & Jasmin Redzepagic(2838)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2526)
Mastering PowerShell Scripting - Fourth Edition by Chris Dent(2418)
Docker on Windows by Stoneman Elton(2321)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Creative Projects for Rust Programmers by Carlo Milanesi(2270)
Hands-On AWS Penetration Testing with Kali Linux by Karl Gilbert(2113)
Hands-On Linux for Architects by Denis Salamanca(2055)
Programming in C (4th Edition) (Developer's Library) by Stephen G. Kochan(2006)
Computers For Seniors For Dummies by Nancy C. Muir(2006)
The Old New Thing by Raymond Chen(1942)
Linux Kernel Debugging by Kaiwan N Billimoria(1765)
